IBM

Reputational risk and IT in the banking industry

Reputational risk and IT: How security and business continuity can shape the reputation and value of your company is an IBM study that investigates how organizations around the world are managing their reputations in today’s digital era, where IT is an integral part of the organization and IT failures can result in reputational damage. The

Quality management throughout the product and application lifecycle

The bottom line—success or failure often depends upon one thing: Whose product or service is of the highest quality. The quest for business transformation through innovation and increasing reliance on software to deliver that innovation, while at the same time reducing risk and cost, mandates a more rigorous approach to managing software quality. Complexity is

A Rational approach to integration testing

Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can

Service Virtualization For Dummies

Welcome to Service Virtualization For Dummies, IBM Limited Edition. Service virtualization helps companies create more efficient testing environments by eliminating many of the roadblocks that testing teams typically encounter. While testing teams want to test early in the application development process, it’s hard to make this plan a reality based on the increasing complexity of

Virtualizing disaster recovery using cloud computing

Almost from the beginning of widespread adoption of computers, organizations realized that disaster recovery was a necessary component of their information technology (IT) plans. Business data had to be backed up, and key processes like order entry, billing, payroll and procurement needed to continue even if an organization’s data center was disabled due to a

Holistic risk management: perspectives from IT professionals

Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment. This movement has led to important changes in the roles of IT professionals as they become progressively more engaged in managing all types of risk confronting the organization.

Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized

“Security intelligence” is a term that is commonly used within the information security community, but one that often lacks clarity and definition. Closely aligned with security incident and event management (SIEM), security intelligence is best defined as: “Security intelligence (SI) is the real-time collection, normalization, and analysis of the data generated by users, applications and

Responding to—and recovering from—sophisticated security attacks

Like so many other things in today’s world, cyber attacks— along with those who perpetrate them—are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and data across multiple devices. It’s now clear that simply protecting an organization’s perimeter is not enough.

Preventing security risks in real time

As the world becomes more digitized and interconnected, the door to emerging security leaks has opened wider. Today, there are billions of RFID tags for items including products, passports, buildings and animals. With more than two billion Internet users and cellular phone subscriptions now exceeding five billion, nearly one in three people worldwide surfs the

Business-driven data privacy policies Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data

Enhancing information security is no longer solely a task for IT—it’s a strategic, enterprise-wide priority. According to interviews conducted by IBM with 138 security leaders, two-thirds of senior executives are paying closer attention to enterprise data privacy than they were two years ago. Recent statistics on data security breaches and data loss help explain why.